![]() ![]() If it gets stolen, yeah, I might go hungry and I might have to take the effort to build another bologna sandwich, but there's plenty of bologna in the world. But my bologna sandwich, I'm not as concerned about it. I cannot afford to lose the crown jewels. In another colorful analogy Gerry shares, “ I like to use the stupid analogy of a bologna sandwich and crown jewels. So again, all data is not created equal.” And if you got compromised, my first question as a cybersecurity analyst is probably going to be, what did you have access to? I'm not talking about you anymore. But you want to get the right data to the right people at the right time, not all the data to all the people all the time. “So bad guys, nation state actors and stuff, they're very well backed, financed, persistent as well about getting information. Al to break into the Soft Gooey Center of the Tootsie Roll Pop… It only took three.” And I kind of trust those people in the Soft Gooey Center. Then we have the Hard Outer Shell and the Soft Gooey Center. In traditional approaches to cybersecurity, “We kind of choose the highest value of data and we draw this big circle around it, in what I like to call the Tootsie Roll Pop approach. ![]() “All data is not created equal,” he continues. What am I trying to protect at the end of the day? And I always refer to it and I keep it, I'm keeping it overly simple, but I'm protecting data.” “When I describe Zero Trust, I kind of describe it from the inside out. And if we get into True Zero Trust and understand the true principles that John Kindervag, when he fathered Zero Trust and the five principles that he created at Forrester,” explains Gerry Caron. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |